TUN-3464: Newtype to wrap []ingress.Rule
This commit is contained in:
		
							parent
							
								
									4a4a1bb6b1
								
							
						
					
					
						commit
						c96b9e8d8f
					
				|  | @ -196,15 +196,15 @@ func ValidateUrl(c *cli.Context, allowFromArgs bool) (string, error) { | ||||||
| 	return validUrl, err | 	return validUrl, err | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func ReadRules(c *cli.Context) ([]ingress.Rule, error) { | func ReadRules(c *cli.Context) (ingress.Ingress, error) { | ||||||
| 	configFilePath := c.String("config") | 	configFilePath := c.String("config") | ||||||
| 	if configFilePath == "" { | 	if configFilePath == "" { | ||||||
| 		return nil, ErrNoConfigFile | 		return ingress.Ingress{}, ErrNoConfigFile | ||||||
| 	} | 	} | ||||||
| 	fmt.Printf("Reading from config file %s\n", configFilePath) | 	fmt.Printf("Reading from config file %s\n", configFilePath) | ||||||
| 	configBytes, err := ioutil.ReadFile(configFilePath) | 	configBytes, err := ioutil.ReadFile(configFilePath) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return nil, err | 		return ingress.Ingress{}, err | ||||||
| 	} | 	} | ||||||
| 	rules, err := ingress.ParseIngress(configBytes) | 	rules, err := ingress.ParseIngress(configBytes) | ||||||
| 	return rules, err | 	return rules, err | ||||||
|  |  | ||||||
|  | @ -219,7 +219,7 @@ func prepareTunnelConfig( | ||||||
| 	} | 	} | ||||||
| 	dialContext := dialer.DialContext | 	dialContext := dialer.DialContext | ||||||
| 
 | 
 | ||||||
| 	var ingressRules []ingress.Rule | 	var ingressRules ingress.Ingress | ||||||
| 	if namedTunnel != nil { | 	if namedTunnel != nil { | ||||||
| 		clientUUID, err := uuid.NewRandom() | 		clientUUID, err := uuid.NewRandom() | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
|  | @ -235,14 +235,13 @@ func prepareTunnelConfig( | ||||||
| 		if err != nil && err != ingress.ErrNoIngressRules { | 		if err != nil && err != ingress.ErrNoIngressRules { | ||||||
| 			return nil, err | 			return nil, err | ||||||
| 		} | 		} | ||||||
| 		if len(ingressRules) > 0 && c.IsSet("url") { | 		if !ingressRules.IsEmpty() && c.IsSet("url") { | ||||||
| 			return nil, ingress.ErrURLIncompatibleWithIngress | 			return nil, ingress.ErrURLIncompatibleWithIngress | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 
 | 
 | ||||||
| 	var originURL string | 	var originURL string | ||||||
| 	isUsingMultipleOrigins := len(ingressRules) > 0 | 	if ingressRules.IsEmpty() { | ||||||
| 	if !isUsingMultipleOrigins { |  | ||||||
| 		originURL, err = config.ValidateUrl(c, compatibilityMode) | 		originURL, err = config.ValidateUrl(c, compatibilityMode) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			logger.Errorf("Error validating origin URL: %s", err) | 			logger.Errorf("Error validating origin URL: %s", err) | ||||||
|  | @ -275,10 +274,10 @@ func prepareTunnelConfig( | ||||||
| 
 | 
 | ||||||
| 		// List all origin URLs that require validation
 | 		// List all origin URLs that require validation
 | ||||||
| 		var originURLs []string | 		var originURLs []string | ||||||
| 		if !isUsingMultipleOrigins { | 		if ingressRules.IsEmpty() { | ||||||
| 			originURLs = append(originURLs, originURL) | 			originURLs = append(originURLs, originURL) | ||||||
| 		} else { | 		} else { | ||||||
| 			for _, rule := range ingressRules { | 			for _, rule := range ingressRules.Rules { | ||||||
| 				originURLs = append(originURLs, rule.Service.String()) | 				originURLs = append(originURLs, rule.Service.String()) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
|  | @ -33,7 +33,7 @@ type Rule struct { | ||||||
| 	Service *url.URL | 	Service *url.URL | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func (r Rule) String() string { | func (r Rule) MultiLineString() string { | ||||||
| 	var out strings.Builder | 	var out strings.Builder | ||||||
| 	if r.Hostname != "" { | 	if r.Hostname != "" { | ||||||
| 		out.WriteString("\thostname: ") | 		out.WriteString("\thostname: ") | ||||||
|  | @ -59,13 +59,13 @@ func (r *Rule) Matches(hostname, path string) bool { | ||||||
| // FindMatchingRule returns the index of the Ingress Rule which matches the given
 | // FindMatchingRule returns the index of the Ingress Rule which matches the given
 | ||||||
| // hostname and path. This function assumes the last rule matches everything,
 | // hostname and path. This function assumes the last rule matches everything,
 | ||||||
| // which is the case if the rules were instantiated via the ingress#Validate method
 | // which is the case if the rules were instantiated via the ingress#Validate method
 | ||||||
| func FindMatchingRule(hostname, path string, rules []Rule) int { | func (ing Ingress) FindMatchingRule(hostname, path string) int { | ||||||
| 	for i, rule := range rules { | 	for i, rule := range ing.Rules { | ||||||
| 		if rule.Matches(hostname, path) { | 		if rule.Matches(hostname, path) { | ||||||
| 			return i | 			return i | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return len(rules) - 1 | 	return len(ing.Rules) - 1 | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func matchHost(ruleHost, reqHost string) bool { | func matchHost(ruleHost, reqHost string) bool { | ||||||
|  | @ -87,51 +87,61 @@ type unvalidatedRule struct { | ||||||
| 	Service  string | 	Service  string | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| type ingress struct { | type unvalidatedIngress struct { | ||||||
| 	Ingress []unvalidatedRule | 	Ingress []unvalidatedRule | ||||||
| 	Url     string | 	URL     string | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func (ing ingress) validate() ([]Rule, error) { | // Ingress maps eyeball requests to origins.
 | ||||||
| 	if ing.Url != "" { | type Ingress struct { | ||||||
| 		return nil, ErrURLIncompatibleWithIngress | 	Rules []Rule | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | // IsEmpty checks if there are any ingress rules.
 | ||||||
|  | func (ing Ingress) IsEmpty() bool { | ||||||
|  | 	return len(ing.Rules) == 0 | ||||||
|  | } | ||||||
|  | 
 | ||||||
|  | func (ing unvalidatedIngress) validate() (Ingress, error) { | ||||||
|  | 	if ing.URL != "" { | ||||||
|  | 		return Ingress{}, ErrURLIncompatibleWithIngress | ||||||
| 	} | 	} | ||||||
| 	rules := make([]Rule, len(ing.Ingress)) | 	rules := make([]Rule, len(ing.Ingress)) | ||||||
| 	for i, r := range ing.Ingress { | 	for i, r := range ing.Ingress { | ||||||
| 		service, err := url.Parse(r.Service) | 		service, err := url.Parse(r.Service) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return nil, err | 			return Ingress{}, err | ||||||
| 		} | 		} | ||||||
| 		if service.Scheme == "" || service.Hostname() == "" { | 		if service.Scheme == "" || service.Hostname() == "" { | ||||||
| 			return nil, fmt.Errorf("The service %s must have a scheme and a hostname", r.Service) | 			return Ingress{}, fmt.Errorf("The service %s must have a scheme and a hostname", r.Service) | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		if service.Path != "" { | 		if service.Path != "" { | ||||||
| 			return nil, fmt.Errorf("%s is an invalid address, ingress rules don't support proxying to a different path on the origin service. The path will be the same as the eyeball request's path.", r.Service) | 			return Ingress{}, fmt.Errorf("%s is an invalid address, ingress rules don't support proxying to a different path on the origin service. The path will be the same as the eyeball request's path.", r.Service) | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		// Ensure that there are no wildcards anywhere except the first character
 | 		// Ensure that there are no wildcards anywhere except the first character
 | ||||||
| 		// of the hostname.
 | 		// of the hostname.
 | ||||||
| 		if strings.LastIndex(r.Hostname, "*") > 0 { | 		if strings.LastIndex(r.Hostname, "*") > 0 { | ||||||
| 			return nil, errBadWildcard | 			return Ingress{}, errBadWildcard | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		// The last rule should catch all hostnames.
 | 		// The last rule should catch all hostnames.
 | ||||||
| 		isCatchAllRule := (r.Hostname == "" || r.Hostname == "*") && r.Path == "" | 		isCatchAllRule := (r.Hostname == "" || r.Hostname == "*") && r.Path == "" | ||||||
| 		isLastRule := i == len(ing.Ingress)-1 | 		isLastRule := i == len(ing.Ingress)-1 | ||||||
| 		if isLastRule && !isCatchAllRule { | 		if isLastRule && !isCatchAllRule { | ||||||
| 			return nil, errLastRuleNotCatchAll | 			return Ingress{}, errLastRuleNotCatchAll | ||||||
| 		} | 		} | ||||||
| 		// ONLY the last rule should catch all hostnames.
 | 		// ONLY the last rule should catch all hostnames.
 | ||||||
| 		if !isLastRule && isCatchAllRule { | 		if !isLastRule && isCatchAllRule { | ||||||
| 			return nil, errRuleShouldNotBeCatchAll{i: i, hostname: r.Hostname} | 			return Ingress{}, errRuleShouldNotBeCatchAll{i: i, hostname: r.Hostname} | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
| 		var pathRegex *regexp.Regexp | 		var pathRegex *regexp.Regexp | ||||||
| 		if r.Path != "" { | 		if r.Path != "" { | ||||||
| 			pathRegex, err = regexp.Compile(r.Path) | 			pathRegex, err = regexp.Compile(r.Path) | ||||||
| 			if err != nil { | 			if err != nil { | ||||||
| 				return nil, errors.Wrapf(err, "Rule #%d has an invalid regex", i+1) | 				return Ingress{}, errors.Wrapf(err, "Rule #%d has an invalid regex", i+1) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 
 | 
 | ||||||
|  | @ -141,7 +151,7 @@ func (ing ingress) validate() ([]Rule, error) { | ||||||
| 			Path:     pathRegex, | 			Path:     pathRegex, | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return rules, nil | 	return Ingress{Rules: rules}, nil | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| type errRuleShouldNotBeCatchAll struct { | type errRuleShouldNotBeCatchAll struct { | ||||||
|  | @ -155,24 +165,24 @@ func (e errRuleShouldNotBeCatchAll) Error() string { | ||||||
| 		"will never be triggered.", e.i+1, e.hostname) | 		"will never be triggered.", e.i+1, e.hostname) | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| func ParseIngress(rawYAML []byte) ([]Rule, error) { | func ParseIngress(rawYAML []byte) (Ingress, error) { | ||||||
| 	var ing ingress | 	var ing unvalidatedIngress | ||||||
| 	if err := yaml.Unmarshal(rawYAML, &ing); err != nil { | 	if err := yaml.Unmarshal(rawYAML, &ing); err != nil { | ||||||
| 		return nil, err | 		return Ingress{}, err | ||||||
| 	} | 	} | ||||||
| 	if len(ing.Ingress) == 0 { | 	if len(ing.Ingress) == 0 { | ||||||
| 		return nil, ErrNoIngressRules | 		return Ingress{}, ErrNoIngressRules | ||||||
| 	} | 	} | ||||||
| 	return ing.validate() | 	return ing.validate() | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| // RuleCommand checks which ingress rule matches the given request URL.
 | // RuleCommand checks which ingress rule matches the given request URL.
 | ||||||
| func RuleCommand(rules []Rule, requestURL *url.URL) error { | func RuleCommand(ing Ingress, requestURL *url.URL) error { | ||||||
| 	if requestURL.Hostname() == "" { | 	if requestURL.Hostname() == "" { | ||||||
| 		return fmt.Errorf("%s is malformed and doesn't have a hostname", requestURL) | 		return fmt.Errorf("%s is malformed and doesn't have a hostname", requestURL) | ||||||
| 	} | 	} | ||||||
| 	i := FindMatchingRule(requestURL.Hostname(), requestURL.Path, rules) | 	i := ing.FindMatchingRule(requestURL.Hostname(), requestURL.Path) | ||||||
| 	fmt.Printf("Matched rule #%d\n", i+1) | 	fmt.Printf("Matched rule #%d\n", i+1) | ||||||
| 	fmt.Println(rules[i].String()) | 	fmt.Println(ing.Rules[i].MultiLineString()) | ||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|  |  | ||||||
|  | @ -20,7 +20,7 @@ func Test_parseIngress(t *testing.T) { | ||||||
| 	tests := []struct { | 	tests := []struct { | ||||||
| 		name    string | 		name    string | ||||||
| 		args    args | 		args    args | ||||||
| 		want    []Rule | 		want    Ingress | ||||||
| 		wantErr bool | 		wantErr bool | ||||||
| 	}{ | 	}{ | ||||||
| 		{ | 		{ | ||||||
|  | @ -37,7 +37,7 @@ ingress: | ||||||
|   - hostname: "*" |   - hostname: "*" | ||||||
|     service: https://localhost:8001
 |     service: https://localhost:8001
 | ||||||
| `}, | `}, | ||||||
| 			want: []Rule{ | 			want: Ingress{Rules: []Rule{ | ||||||
| 				{ | 				{ | ||||||
| 					Hostname: "tunnel1.example.com", | 					Hostname: "tunnel1.example.com", | ||||||
| 					Service:  localhost8000, | 					Service:  localhost8000, | ||||||
|  | @ -46,7 +46,7 @@ ingress: | ||||||
| 					Hostname: "*", | 					Hostname: "*", | ||||||
| 					Service:  localhost8001, | 					Service:  localhost8001, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| 			name: "Extra keys", | 			name: "Extra keys", | ||||||
|  | @ -56,12 +56,12 @@ ingress: | ||||||
|     service: https://localhost:8000
 |     service: https://localhost:8000
 | ||||||
| extraKey: extraValue | extraKey: extraValue | ||||||
| `}, | `}, | ||||||
| 			want: []Rule{ | 			want: Ingress{Rules: []Rule{ | ||||||
| 				{ | 				{ | ||||||
| 					Hostname: "*", | 					Hostname: "*", | ||||||
| 					Service:  localhost8000, | 					Service:  localhost8000, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| 			name: "Hostname can be omitted", | 			name: "Hostname can be omitted", | ||||||
|  | @ -69,11 +69,11 @@ extraKey: extraValue | ||||||
| ingress: | ingress: | ||||||
|   - service: https://localhost:8000
 |   - service: https://localhost:8000
 | ||||||
| `}, | `}, | ||||||
| 			want: []Rule{ | 			want: Ingress{Rules: []Rule{ | ||||||
| 				{ | 				{ | ||||||
| 					Service: localhost8000, | 					Service: localhost8000, | ||||||
| 				}, | 				}, | ||||||
| 			}, | 			}}, | ||||||
| 		}, | 		}, | ||||||
| 		{ | 		{ | ||||||
| 			name: "Invalid service", | 			name: "Invalid service", | ||||||
|  | @ -308,13 +308,13 @@ ingress: | ||||||
|   - hostname: "*" |   - hostname: "*" | ||||||
|     service: https://localhost:8002
 |     service: https://localhost:8002
 | ||||||
| ` | ` | ||||||
| 	rules, err := ParseIngress([]byte(rulesYAML)) | 	ing, err := ParseIngress([]byte(rulesYAML)) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		b.Error(err) | 		b.Error(err) | ||||||
| 	} | 	} | ||||||
| 	for n := 0; n < b.N; n++ { | 	for n := 0; n < b.N; n++ { | ||||||
| 		FindMatchingRule("tunnel1.example.com", "", rules) | 		ing.FindMatchingRule("tunnel1.example.com", "") | ||||||
| 		FindMatchingRule("tunnel2.example.com", "", rules) | 		ing.FindMatchingRule("tunnel2.example.com", "") | ||||||
| 		FindMatchingRule("tunnel3.example.com", "", rules) | 		ing.FindMatchingRule("tunnel3.example.com", "") | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|  |  | ||||||
|  | @ -93,7 +93,7 @@ type TunnelConfig struct { | ||||||
| 	NamedTunnel     *NamedTunnelConfig | 	NamedTunnel     *NamedTunnelConfig | ||||||
| 	ReplaceExisting bool | 	ReplaceExisting bool | ||||||
| 	TunnelEventChan chan<- ui.TunnelEvent | 	TunnelEventChan chan<- ui.TunnelEvent | ||||||
| 	IngressRules    []ingress.Rule | 	IngressRules    ingress.Ingress | ||||||
| } | } | ||||||
| 
 | 
 | ||||||
| type dupConnRegisterTunnelError struct{} | type dupConnRegisterTunnelError struct{} | ||||||
|  | @ -619,7 +619,7 @@ func LogServerInfo( | ||||||
| 
 | 
 | ||||||
| type TunnelHandler struct { | type TunnelHandler struct { | ||||||
| 	originUrl      string | 	originUrl      string | ||||||
| 	ingressRules   []ingress.Rule | 	ingressRules   ingress.Ingress | ||||||
| 	httpHostHeader string | 	httpHostHeader string | ||||||
| 	muxer          *h2mux.Muxer | 	muxer          *h2mux.Muxer | ||||||
| 	httpClient     http.RoundTripper | 	httpClient     http.RoundTripper | ||||||
|  | @ -645,7 +645,7 @@ func NewTunnelHandler(ctx context.Context, | ||||||
| 	// Check single-origin config
 | 	// Check single-origin config
 | ||||||
| 	var originURL string | 	var originURL string | ||||||
| 	var err error | 	var err error | ||||||
| 	if len(config.IngressRules) == 0 { | 	if config.IngressRules.IsEmpty() { | ||||||
| 		originURL, err = validation.ValidateUrl(config.OriginUrl) | 		originURL, err = validation.ValidateUrl(config.OriginUrl) | ||||||
| 		if err != nil { | 		if err != nil { | ||||||
| 			return nil, "", fmt.Errorf("unable to parse origin URL %#v", originURL) | 			return nil, "", fmt.Errorf("unable to parse origin URL %#v", originURL) | ||||||
|  | @ -727,9 +727,9 @@ func (h *TunnelHandler) createRequest(stream *h2mux.MuxedStream) (*http.Request, | ||||||
| 		return nil, errors.Wrap(err, "invalid request received") | 		return nil, errors.Wrap(err, "invalid request received") | ||||||
| 	} | 	} | ||||||
| 	h.AppendTagHeaders(req) | 	h.AppendTagHeaders(req) | ||||||
| 	if len(h.ingressRules) > 0 { | 	if !h.ingressRules.IsEmpty() { | ||||||
| 		ruleNumber := ingress.FindMatchingRule(req.Host, req.URL.Path, h.ingressRules) | 		ruleNumber := h.ingressRules.FindMatchingRule(req.Host, req.URL.Path) | ||||||
| 		destination := h.ingressRules[ruleNumber].Service | 		destination := h.ingressRules.Rules[ruleNumber].Service | ||||||
| 		req.URL.Host = destination.Host | 		req.URL.Host = destination.Host | ||||||
| 		req.URL.Scheme = destination.Scheme | 		req.URL.Scheme = destination.Scheme | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue